DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Fake Installers to Monero: A Multi-Tool Mining Operation

Fake Installers to Monero: A Multi-Tool Mining Operation

Comments
1 min read
Elastic releases detections for the Axios supply chain compromise

Elastic releases detections for the Axios supply chain compromise

Comments
1 min read
Inside the Axios supply chain compromise - one RAT to rule them all

Inside the Axios supply chain compromise - one RAT to rule them all

Comments
1 min read
Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Comments
1 min read
Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

Comments
1 min read
AI Threat Landscape Digest January-February 2026

AI Threat Landscape Digest January-February 2026

Comments
1 min read
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM

TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM

Comments
1 min read
Claude Code source code accidentally leaked in NPM package

Claude Code source code accidentally leaked in NPM package

Comments
1 min read
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Comments
1 min read
How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally

How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally

Comments
1 min read
Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Comments
1 min read
DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Comments
1 min read
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

Comments
1 min read
Supercharge Your SOC

Supercharge Your SOC

Comments
1 min read
Streamlining the Security Analyst Experience

Streamlining the Security Analyst Experience

Comments
1 min read
Security Automation with Elastic Workflows: From Alert to Response

Security Automation with Elastic Workflows: From Alert to Response

1
Comments
1 min read
Investigating from the Endpoint Across Your Environment with Elastic Security XDR

Investigating from the Endpoint Across Your Environment with Elastic Security XDR

Comments
1 min read
2025 Talos Year in Review: Speed, scale, and staying power

2025 Talos Year in Review: Speed, scale, and staying power

Comments
1 min read
Beers with Talos breaks down the 2025 Talos Year in Review

Beers with Talos breaks down the 2025 Talos Year in Review

Comments
1 min read
New CrowdStrike Innovations Secure AI Agents and Govern Shadow AI Across Endpoints, SaaS, and Cloud

New CrowdStrike Innovations Secure AI Agents and Govern Shadow AI Across Endpoints, SaaS, and Cloud

Comments
1 min read
23rd March – Threat Intelligence Report

23rd March – Threat Intelligence Report

Comments
1 min read
Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender

Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender

Comments
1 min read
We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

Comments
1 min read
VoidStealer malware steals Chrome master key via debugger trick

VoidStealer malware steals Chrome master key via debugger trick

Comments
1 min read
FBI warns of Handala hackers using Telegram in malware attacks

FBI warns of Handala hackers using Telegram in malware attacks

Comments
1 min read
M-Trends 2026: Data, Insights, and Strategies From the Frontlines

M-Trends 2026: Data, Insights, and Strategies From the Frontlines

Comments
1 min read
Move fast and save things: A quick guide to recovering a hacked account

Move fast and save things: A quick guide to recovering a hacked account

Comments
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Comments
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw

Oracle pushes emergency fix for critical Identity Manager RCE flaw

3
Comments
1 min read
VoidStealer malware steals Chrome master key via debugger trick

VoidStealer malware steals Chrome master key via debugger trick

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good, the Bad and the Ugly in Cybersecurity – Week 12

Comments
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Comments
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Comments
1 min read
You have to invite them in

You have to invite them in

1
Comments
1 min read
EDR killers explained: Beyond the drivers

EDR killers explained: Beyond the drivers

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Comments
1 min read
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

1
Comments
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw

Oracle pushes emergency fix for critical Identity Manager RCE flaw

1
Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good, the Bad and the Ugly in Cybersecurity – Week 12

Comments
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Comments
1 min read
How to Lead Effective Tabletops

How to Lead Effective Tabletops

Comments
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

Comments
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server

2026-03-17: Seven days of scans and probes and web traffic hitting my web server

Comments
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

1
Comments
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report

AI and browser threats stand out in the 2026 Threat Detection Report

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

Comments
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Comments
1 min read
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Comments
1 min read
ConnectWise patches new flaw allowing ScreenConnect hijacking

ConnectWise patches new flaw allowing ScreenConnect hijacking

Comments
1 min read
Why East-West Visibility Matters for Grid Security

Why East-West Visibility Matters for Grid Security

Comments
1 min read
Transparent COM instrumentation for malware analysis

Transparent COM instrumentation for malware analysis

Comments
1 min read
loading...